Title: GRID SECURITY
1GRID SECURITY
2Grid Computing
- Grid Computing
- Sharing, integration and coordinated use of
diverse resources and services under multiple
control domains or simply in distributed Virtual
Organizations - Virtual Organization
- A group of individuals/resources/institutions
united by a common purpose but may not
necessarily located in a single administrative
domain.
3The Grid Security Problem
- Main Challenge
- Establishing a secure relationship not only
between a client and a server but also between
hundreds of processes and resources under
different administrative domains (VOs) - While maintaining basic network security features
such as - Unauthorized access
- Tampered information
- Man in the middle attacks
4Easy? Didnt think so
- What makes it even more difficult is the distinct
characteristic of the grid - Distinctive characteristic
- Diverse local mechanisms Interoperate with
existing security mechanisms - Dynamic creation of services Users creating new
services without any administrator intervention - Dynamic creation of trust domains Establish
trust not only among user-resources within a VO
but also within multiple dynamic organizations
5Globus Grid Security Infrastructure
- Globus
- Is an open source software toolkit used for
building Grid systems and applications - Grid Security Infrastructure
- Is the name given to the part of Globus which
deals with security functionality
6GT2 Grid Security Model
- Distinct characteristic of the grid and how GSI
handles it - Diverse Site Security Mechanisms
- Dynamic Creation of entities and granting
privileges to these entities - Dynamic Creation and management of overlaid trust
domains
7Diverse Site Security Mechanisms
- GSI uses
- X.509 Certificate Every user and service on the
Grid is uniquely identified and authenticated via
this certificate - Contains
- Subject name
- Public key
- The identity of a CA and the digital signature of
the CA - TLS, SSL Is used to perform mutual
authentication and then provide message
protection (encryption, integrity checking)
8Advantages
- Gateways can be used for translation from one
scheme to other - For Example Kerberos Certificate Authority and
SSLK5/PKINIT can be used to translate to GSI - Keep the existing scheme
- Certificate Authority eases the establishment of
a trust (unilaterally) - For example A single entity can decide to trust
a CA or not without involving the organization as
a whole - This become more apparent when the organization
is not fully involved
9Dynamic creation of entities granting of
privileges
- Single Sign-on Delegation
- For Example each time a resource wants to use
another resource it will need to authenticate. - Send the private key to resource (not a good
idea) - Ask the user each time (not very efficient)
10Proxy Certificates
- X.509 Proxy Certificates allows a user to assign
dynamically a new X.509 certificate to an entity
and then delegate some subset of its rights to
this entity
11How does it work?
- Create a new public and private key set for the
proxy sign it with your long term private key
instead of sending it to sign by CA - Containing the new proxys public key
- Singed by the proxys owner
- Create a (limited lifetime) certificate
12Dynamic creation management of overlaid trust
domains
- Overlaid trust domains
- Proxy Certificates Users can create trust
domains by issuing proxy certificates to any
service they wish to collaborate. - Simple solution doesnt work when get complicated.
13Community Authorization Service
- Community Authorization Service in GSI
- Authorization Service GSI supports the notion of
local policy enforced locally (User Certificate
-gt Unix account)
14Why do we need CAS?
- Scalability The cost of administering a VO
shouldnt increase with the number of resource
providers in the VO - Flexibility Expressibility Difficulty in
bookkeeping (this community should use of the
resource) - Policy Hierarchy Each institute can introduce
new policies. ( Consistency between IP VO LP)
15Community Authorization Service
- Basically allow resource owners to grant access
to blocks of resources to a community as a whole
and let the community itself manage memberships
and fine-grained access control policies while
remaining in full power of the resource.
16- A CAS server is initiated for a community
- Resource providers grant privileges to the CAS
- User first contacts the CAS server before
contacting the resource - The CAS server delegates rights / assertion to
the user according to access control policies or
simply the role of the user within the community - - Rights / Assertion / Capabilities user
presents these to the resource to gain access - Resource evaluates the
- resource policy assertions
- and grants access / declines
17Extensions made in GSI
- Restricted Proxy Credentials
- Grant new proxies with restricted rights
- Policy Language
- Neutral can support different policy languages
- Libraries and APIs
- Policy evaluation API and library
18Problems with the CAS
- Bottleneck
- The CAS can be the bottleneck.
- Restricted Proxy Certificates
- An entity can change its rights
- Compromised CAS server
- Can issue wrong certificates
- Compromised Resource server
- Steal community data, Steal user identity
- Revocation mechanism
- Act like the user if compromised
19GT3 Security model for OGSA
- The Open Grid Services Architecture (OGSA)
represents a set of technical specification
towards a Grid system architecture based on Web
services - Web Services allow software components to be
defined in terms of access methods, bindings of
these methods to specific communication
mechanisms, and mechanisms for discovering
relevant services. - For Example
- SOAP
- WSDL
20Main Goal
- GT3s security model seeks to allow applications
and users to operate on the Grid in as seamless
and automated a manner as possible.
21Features of OGSA and Web Services
- The features that are implemented in GT3
- Security as Services (located and used)
- Hosting Environment (pass the security
implementation to the environment) - Publishing of Security Policy (publish security
mechanisms needed) - Specified format for Security Tokens (token
interoperability)
22Security as Services
- OGSA security model casts security functions as
services where an application can outsource its
security functionality using well defined
protocols and interfaces offered by these
services. - Credential processing service
- Authorization service
- Credential Conversion service
- Identity Mapping service
- Audit
23Hosting Environment
- Such as JAVA and .NET provide a high level of
functionality to the applications helping them
reduce the complexity and place it into the
hosting environment.
24Publishing of Security Policy
- Find a common set of security mechanisms that
both parties understand - For an application to start using the security as
a service and hosting environment features it
needs to know what mechanisms are acceptable by
that service - Publish your security policy interface
specification as WSDL documents using WS-Policy
specification - Acceptable trust roots
- Token formats
- And other security parameters
25Specified Format for Security Tokens
- WS-Security, WSSecureConversation, and WS-Trust
specifications contain conventions and formats
for the communication of various mechanism
specific tokens inside SOAP envelopes.
26(No Transcript)
27GT3 Security Implementation
- Advantages over GT2
- Use of WS-Security protocols and standards
(Seamless integration for future) - Tight least-privilege model (For security)
28Use of Web Services Security and Protocol
- GT3 uses Web services for transportation and
manipulations of security related messages. - Stateful (SOAP XML-Signatures)
- Stateless (XML-Signatures)
29Tight Least-Privilege Model
- Least privilege is a well-known principle in
computer security that states that each entity
should only have the minimal privilege needed to
accomplish its assigned role and no more. - No privileged services.
- Minimal privileged code.
30GT3 GRAM Implementation
- GRAM is one of the most important services in the
GT3 from a security perspective, that basically
allows a remote client to instantiate a
communication and use this connection in a secure
way to access and monitor a remote job in a
remote resource. - Managed Job Service
- Master Managed Job Factory Service
31(No Transcript)
32Conclusions
- Security is a hard task to achieve in Grid
Systems mainly because of the distinct
characteristic of the grid environment - Community authorization servers helps to overcome
the administration overhead of virtual
organizations - Web Services is a really important development
which helped security in grid systems and will
have more use in future
33Questions?